Cyber Security Round-up
114 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Alicia Butler
Scoop.it!

Hackers Take Limo Service Firm for a Ride

Hackers Take Limo Service Firm for a Ride | Cyber Security Round-up | Scoop.it
A hacker break in at a U.S. company that brokers reservations for limousine and Town Car services nationwide has exposed the personal and financial information on more than 850,000 well-heeled customers, including Fortune 500 CEOs, lawmakers, and...
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Interop New York Sponsors & Exhibitors Launch New Products & Services

Interop New York Sponsors & Exhibitors Launch New Products & Services | Cyber Security Round-up | Scoop.it
These sponsors and vendors will join 120 exhibitors on the Expo show floor
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Compliance deadline on HIPAA rules brings expanded responsibilities for third parties handling data

Compliance deadline on HIPAA rules brings expanded responsibilities for third parties handling data | Cyber Security Round-up | Scoop.it
Business associates of HIPAA-covered entities are now legally bound to follow the same guidelines when securing patients' protected health information.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Destructive Attacks On Oil And Gas Industry A Wake-Up Call

Destructive Attacks On Oil And Gas Industry A Wake-Up Call | Cyber Security Round-up | Scoop.it
Cyberattacks could have real-world economic consequences in the oil & gas markets, even at the pump
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

For Security Pros, Maintaining Credibility Means Walking A Fine Line

For Security Pros, Maintaining Credibility Means Walking A Fine Line | Cyber Security Round-up | Scoop.it
In security, crying wolf too often -- or too infrequently -- can both lead to big trouble
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Ten Things To Consider When Developing An Enterprise BYOD Security Policy

Ten Things To Consider When Developing An Enterprise BYOD Security Policy | Cyber Security Round-up | Scoop.it
Is there a safe way to let employees access corporate data from their own mobile devices? Here are some things to think about
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Banking trojan now circulating overseas could soon reach U.S.

Banking trojan now circulating overseas could soon reach U.S. | Cyber Security Round-up | Scoop.it
The Hesperbot trojan has been distributed via sophisticated phishing emails impacting online banking customers in the Czech Republic, Turkey and Portugal.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Five Indicators To Watch For On Your Networks

Five Indicators To Watch For On Your Networks | Cyber Security Round-up | Scoop.it
Companies analyzing the voluminous data produced by information systems should make sure to check user access, configuration changes and database transactions, among other log events
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

So-called CNN emails on U.S. bombing Syria lead to exploit kit

So-called CNN emails on U.S. bombing Syria lead to exploit kit | Cyber Security Round-up | Scoop.it
The phishing emails contain shortened links to a crimeware kit that exploits vulnerabilities in Adobe Reader and Java, researchers warn.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

The Future Of IPS

The Future Of IPS | Cyber Security Round-up | Scoop.it
Will Next-Generation IPS (NGIPS) feature sets maintain the relevance of IPS in security strategies?
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

NIST Cyber Security Framework proposal provides no 'measurable cybersecurity ... - CSO

NIST Cyber Security Framework proposal provides no 'measurable cybersecurity ... - CSO | Cyber Security Round-up | Scoop.it
NIST Cyber Security Framework proposal provides no 'measurable cybersecurity ...
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Computer hard drive compromised in hotel burglary

Computer hard drive compromised in hotel burglary | Cyber Security Round-up | Scoop.it
The hard drive contained personal information of guests, including credit and debit card numbers, and may have been accessed by criminals.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Botnet Behind Mysterious Spike In Tor Traffic

Botnet Behind Mysterious Spike In Tor Traffic | Cyber Security Round-up | Scoop.it
Turns out the massive jump in millions of new Tor clients during the past month wasn't about the NSA, Syria, or Tor-based Pirate Bay bundles -- it was pure cybercrime
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Thousands of cards compromised in classic skimming operation

Thousands of cards compromised in classic skimming operation | Cyber Security Round-up | Scoop.it
Four Romanian nationals have been arrested and charged with targeting ticket vending machines of MTA Long Island Rail Road in a classic skimming operation.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Hackers bypass Apple's Touch ID, earn thousands of dollars

Hackers bypass Apple's Touch ID, earn thousands of dollars | Cyber Security Round-up | Scoop.it
It took less than 48 hours for a European hacker association known as Chaos Computer Club (CCC) to become the first group to bypass Apple's Touch ID.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Hackers leveraging IE zero-day used watering hole attacks to compromise users

Hackers leveraging IE zero-day used watering hole attacks to compromise users | Cyber Security Round-up | Scoop.it
At least three major media sites in Japan were infected, so that visitors' running vulnerable versions of IE would be exploited, FireEye researchers found.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Is The Perimeter Really Dead?

Is The Perimeter Really Dead? | Cyber Security Round-up | Scoop.it
Despite naysayers, many security experts believe perimeter defenses have relevance when deployed as a part of defense-in-depth
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

How To Cushion The Impact Of A Data Breach

How To Cushion The Impact Of A Data Breach | Cyber Security Round-up | Scoop.it
A major breach can wreak havoc on many aspects of the business. Here are some ways to soften the blow
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Email contains personal data on thousands of insurance agents

Email contains personal data on thousands of insurance agents | Cyber Security Round-up | Scoop.it
Thousands of agents with MNsure may have had personal data compromised when an employee inadvertently sent out an email with an attachment that contained the information.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Laptop and flash drive stolen from doctor's car

Laptop and flash drive stolen from doctor's car | Cyber Security Round-up | Scoop.it
A laptop and flash drive containing health information for thousands of patients of St. Anthony's Medical Center in St. Louis was stolen from a doctor's car.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

State employee error puts thousands at risk

State employee error puts thousands at risk | Cyber Security Round-up | Scoop.it
A Georgia Department of Labor employee inadvertently put thousands at risk after sending out an email containing their personal data.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Fatal distraction: 7 IT mistakes that will get you fired - InfoWorld

Fatal distraction: 7 IT mistakes that will get you fired - InfoWorld | Cyber Security Round-up | Scoop.it
Fatal distraction: 7 IT mistakes that will get you fired
InfoWorld
It's hard to get a good job in IT these days, but it's all too easy to lose one. There are lots of reasons for instant termination.
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

New, Advanced Banking Trojan Discovered In The Wild

New, Advanced Banking Trojan Discovered In The Wild | Cyber Security Round-up | Scoop.it
New "Hesperbot" Trojan targets online banking users in Europe, Turkey
more...
No comment yet.
Rescooped by Alicia Butler from High Technology Threat Brief (HTTB) (1)
Scoop.it!

NIST Cyber Security Framework proposal provides no 'measurable cybersecurity assurance'

NIST Cyber Security Framework proposal provides no 'measurable cybersecurity assurance' | Cyber Security Round-up | Scoop.it

Plan's self-regulatory approach toward industrial control systems 'doesn't do us a hell of a lot of good,' another expert said (NIST Cyber Security Framework proposal provides no 'measurable cybersecurity ...


Via Daniel A. Libby, CFC
more...
No comment yet.
Scooped by Alicia Butler
Scoop.it!

Tripwire Survey: 64% Of IT Profs Don’t Communicate Security Risks

Tripwire Survey: 64% Of IT Profs Don’t Communicate Security Risks | Cyber Security Round-up | Scoop.it
47 percent said that collaboration between security risk management and business is poor, nonexistent, or adversarial
more...
No comment yet.